General questions Flashcards

1
Q

What type of information does a control risk use?

A

Financial information

Control risks specifically apply to financial information, where they may impact the integrity or availability of the financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Dave has been required to build his company’s security policies. Which of the following policies is commonly put in place for service accounts?

A

They cannot use interactive logins

It is common practice to prohibit interactive logins to a GUI or shell for service accounts. Use of a service account for interactive logins or attempting to log in as one should be immediately flagged and alerted on as an indicator of compromise (IoC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of technique is commonly used by malware creators to shift the signature of malware to prevent detection by antivirus tools?

A

Refactoring

Refactoring a program by automated means can include adding additional text, comments, or nonfunctional operations to make the program have a different signature without changing its operations. This is typically not a manual operation due to the fact that antimalware tools can quickly find new versions. Instead, refactoring is done via a polymorphic or code mutation technique that changes the malware every time it is installed to help avoid signature-based systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bruce needs a cryptographic algorithm that provides low latency. What type of cryptosystem is most likely to meet this performance requirement?

A

Symmetric encryption

A symmetric cryptosystem will typically perform faster and with less processor overhead and thus lower latency than asymmetric cryptosystems. Hashing is not encryption, and one-time pads are not implemented in modern cryptosystems, although they may have uses in the future quantum cryptographic solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Luna needs to capture the contents of physical memory by using a command-line tool on Linux system. Which of the following tools can apply on this task?

A

memdump

The memdum tool ios a command0line memory dump utility that can dump physical memory. Somewaht confusingly, memdump is also a flag in the very useful Volatility framework, where it can be used to dump memory as well. The remaining options were made up and are not Linux tools, although you can create a ramdump on Android devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Selina needs to determine services on a remote machine and label the services with service names and other general details. Of the following tools, which one will not give that information.

A

netcat

Although all of the tools listed can perform a port scan and identify open ports, netcat is the only one that does not also integrate automated service identification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following term describes a military strategy for political warfare that merges conventional warfare, irregular warfare, and cyberwarfare with fake news, social media influence strategies, diplomatic efforts, and manipulation of legal activities?

A

Hybrid warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Carly has been asked to set up access control for a server. The requirements state that users at a lower privilege level should not be able to see or access files or data at a higher privilege level. What access control model would best fit these requirements?

A

MAC

Mandatory access control (MAC). It will not allow lower privileged users to even see the data at a higher privilege level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Nathan operates a vulnerability scan using up-to-date definitions for a system that he knows has a vulnerability in the version of Apache that it is running. The vulnerability scan does not show that issue when he reviews the report. What has Nathan addressed?

A

A false negative

A false negative occurs with a vulnerability scanning system when a scan is run and an issue that exists is not identified.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Your security manager needs to determine which risks to minimize based on cost. This is an example of:

A

Quantitative risk assessment is the process of assigning numerical values to the probability an event will occur and what impact the event will have.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Your company has produced some new security directives. One of these new directives is that all documents must be shredded before being thrown out. Which of the following types of attack is this attempting to prevent?

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Olivia has issued Android tablets to staff in her production facility, but cameras are banned due to sensitive data in the building. What type of tool can she use to control camera use on all of her organization ‘ s corporate devices that she issues?

A

MDM

Mobile device management (MDM) tool, allows control of the devices, which would allow Olivia to lock out cameras and preventing staff members from using the tablets to take pictures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Gabriel wants to enforce a wide variety of settings for devices used in her organization. Which of the following methods should she select if she needs to manage hundreds of devices while setting rules for use of SMS and MMS, audio and video recording, GPS tagging, and wireless connection methods like tethering and hotspot modes?

A

Use a UEM tool and application to manage the devices.

A universal endpoint management (UEM) tool can manage desktops, laptops, mobile devices, printers, and other devices. UEM tools are often used applications deployed to mobile devices to configure and manage them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does asymmetric encryption support nonrepudiation?

A

Using digital signatures

Digital signatures that use a sender’s private key provide nonrepudiation by allowing a sender to prove that they sent a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Manus is concerned about someone using a password cracker on computers in his company. He is concerned that crackers will attempt common passwords in order to log in to a system. Which of the following would be best for mitigating this threat?

A

Account lockout policies

Accounts should lock out after a small number of login attempts. Three is a common number of attempts before the account is locked out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The virtual machine cluster that Brian takes responsibility for has experienced a huge failure in its primary controller. The entire company is offline, and users cannot get to the company’s website which is its primary business. What type of disaster is it?

A

An internal disaster

This is an internal disaster — one in which internal issues have led to a problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When a program has variables, especially arrays, and does not check the boundary values before inputting data, what attack is the program vulnerable to?

A

Buffer overflow

A buffer overflow is possible when boundaries are not checked and the attacker tries to put in more data than the variable can hold.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Joce has been asked to implement a directory service. Which of the following technologies should she deploy?

A

LDAP

the only directory service listed is Lightweight Directory access protocol (LDAP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Your company relies heavily on cloud and SaaS service providers such as salesforce.com, Office365, and Google. Which of the following would you have security concerns about?

A

SAML

Security assertion markup language (SAML) is an extensible markup language (XML) framework for creating and exchanging security information between partners online.

20
Q

Endpoint detection and response has three major components that make up its ability to provide visibility into endpoints. Which of the following is not one of those three parts?

A

Malware analysis

Endpoint detection and response (EDR) focuses on identifying anomalies and issues, but it is not designed to be a malware analysis tool.

21
Q

What steps of handling a disaster are covered by a disaster recovery plan?

A

What to do before, during, after the disaster.

Disaster recovery requires forethought and preparation, response to issues, and minimize impact during a disaster.

22
Q

Which of the following lessens the success of dictionary password attacks?

A

password complexity requirements

complex password enforcement means dictionary words or username variations, to name just a few, cannot be used as passwords.

23
Q

The company that John works for has experienced a data breach, and the personal information of thousands of customers has been revealed. What impact category is not a concern as described in this scenario?

A

Availability loss

This description does not include any risk to availability since there is no information about the system or services being down or offline.

24
Q

Ricky needs to show information from his company’s risk register in a way that is easy to understand and rank format. Which of the following common tools is applied to help management quickly understand relative rankings of risk?

A

A heat map

Risk heat maps or a risk matrix can allow an organization to quickly look at risks and compare them based on their responsibilities and impact or other rating elements.

25
Q

Which of the following is the best description for a collection of computers that have been compromised and are being controlled from one central point?

A

Botnet

A collection of computer that are compromised, then centrally controlled to perform actions like DOS, data collection, and other malicious activities are called a botnet.

26
Q

Patching systems immediately after patches are released. This is an example of what risk management strategy?

A

Avoidance

Patching is a form of avoidance because it works to remove risk from the environment. Acceptance of flaws that need patching would involve leaving the software unpatched.

27
Q

Which of the following would stop a person from installing a program on a company-owned mobile device?

A

An allow list

Allow lists are lists of approved software. Software can only be installed if it is on an allow list. Deny lists block specific applications, but they cannot account for every possible malicious application.

28
Q

What type of attack uses a second wireless access point (WAP) that broadcasts the same SSID as a legitimate access point, in trying to get users to connect to the attacker’s WAP?

A

Evil twin

Evil twin attacks use malicious access point configured to appear to identical to a legitimate AP.

29
Q

Thara is concerned about staff in her organization sending email with sensitive information like customer Social Security numbers (SSNs) included in it. What type of solution can she implement to help prevent inadvertent exposures of this type of sensitive data?

A

DLP

Data loss prevention (DLP) tools allow sensitive data to be tagged and monitored so that if a user attempts to send it, they will be notified, administrators will be informed, and if necessary, the data can be protected using encryption or other protection methods before it is sent.

30
Q

Spyware is an example of what type of malicious software?

A

A PUP

Spyware and adware are both common examples of a PUP or potentially unwanted program.

31
Q

Mark is working for a government agency that has got a Freedom of Information Act (FoIA) request and has to give the requested information from its email servers. What this process called?

A

e-discovery

electronic discovery is the legal proceeding involved in litigation.

32
Q

Amanda’s company has adopted multiple software-as-a-service (SaaS) tools and now wants to better coordinate them so that the data that they each contain can be used in multiple services. Which of the following types of solutions should she recommend if she wants to reduce the complexity of long-term maintenance for her company?

A

Adopt an integration platform to leverage scalability

Services integration in cloud and virtualization environments can be very complex and can involve data, APIs, and other types of application integration. Integration platforms allow organizations to use a standardized tool rather than building and maintaining their own. This allows them to focus on the actual integrations rather than the underlying system, saving time and effort.

33
Q

Mark is responsible for managing his company’s load balancer and wants to use a load-balancing scheduling technique that will take into account the current server load and active sessions. Which of the following techniques should he choose?

A

Least connection

The least connection-based load balancing takes the load into consideration and sends the next request to the server with the least number of active sessions.

34
Q

Henry has to create a checklist with all the steps to respond to a specific incident. What type of artifact should he make to do so in his security orchestration, automation, and response (SOAR) environment?

A

A playbook.

Playbook list the required steps that are needed to address an incident. A runbook focuses on the steps to perform an action or process as part of an incident response process.

35
Q

Which type of credential policy is typically made to deal with contractors and consultants?

A

third-party policy

Third-party policy address how contractors and consultant credentials are handled. This may require sponsorship by an internal staff member.

36
Q

Elaine needs to identify what websites a user has recently visited using the contents of a forensically acquired hard drive. Of the following locations, which one would not be helpful for her investigation?

a) the browser cache
b) the browser’s bookmark
c) the browser’s history
d) session data

A

The browser’s bookmark

37
Q

Patrick wants to make a contract with a company to have data center space that is equipped and ready to go so that he could bring his data to the location in the event of a disaster. What type of disaster recovery site is he seeking?

A

A warm site

Patrick is looking for a warm site, which has some or all of the infrastructure and systems he needs but does not have data.

38
Q

Samantha is carrying out an exercise for her organization and wants to run an exercise that is as close to an actual event as possible. What type of event should she run to help her organization get this type of real-world practice?

A

A simulation

A simulation is the closest you can get to a real-world event without having one.

39
Q

Harry filming a video of the removal of a drive from a system when he is preparing for a forensic investigation. What is the most suitable reason explaining his action?

A

To document the chain of custody and provenance of the drive

Harry’s most likely use for the video is to document the forensic process, part of the chain of custody, and provenance of the forensic data he acquired.

40
Q

Mary is responsible for database management and security. She is trying to remove redundancy in the database. What is this process called?

A

Normalization

Normalization is the process of removing duplicate or redundant data from a database. There are typically four levels of normalization ranging from 1N at the lowers to 4N at the highest.

41
Q

Jim needs to find a common set of tools for security and risk management for his infrastructure as a service (IaaS) environment. Which organizations provide a vendor-neutral reference architecture that he can apply to verify his design?

A

The cloud security alliance

the cloud security alliance’s reference architecture includes information about tools in a vendor neutral manner.

42
Q

Alex is starting his risk assessment for the company and has not yet started to implement controls. What kind of risk does his company have?

A

Inherent risk

Inherent risk is the risk that an organization faces before controls are put in place. Without risk assessment and controls in place, Alex must first deal with the inherent risks the organization has as it exists today.

43
Q

Patrick is assessing an organization and finds that they have numerous multifunction printers (MFPs) that are accessible from the public Internet. What is the most critical security problem he should detect?

A) The printers may allow attackers to access other parts of the company network.

B) Third parties could print to the printers, using up the supplies.

C) The scanners may be accessed to allow attackers to scan documents that are left in them.

D) The printers could be used as part of a DDoS attack.

A

the printers may allow attackers to access other parts of the company network

44
Q

What type of communications is SRTP most likely to be used for?

A

VoIP

SRTP is a secure version of the real-time transport protocol and is used primarily for voice over IP (VoIP) and multimedia streaming or broadcast.

45
Q

Which of the following convention is less official than a traditional contract but it still plays a certain role of importance to all parties involved?

A

MOU

A memorandum of understanding (MOU) is a type of agreement that is usually not legally binding. This agreement is intended to be mutually beneficial without involving courts or money.